Security of Context Transfer in Future Wireless Communications

نویسندگان

  • M. Georgiades
  • H. Wang
  • R. Tafazolli
چکیده

Page 1 (9) Abstract—New security considerations arise if context transfer is to be employed in the Ambient Network architecture. In this paper we investigate, new security requirements and considerations for context transfer in Ambient Networks, the transfer of security state information, the provisioning of security support of session mobility using context transfer, and finally an analysis of security issues of context transfer in homogeneous and heterogeneous environments.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A Lightweight Intrusion Detection System Based on Specifications to Improve Security in Wireless Sensor Networks

Due to the prevalence of Wireless Sensor Networks (WSNs) in the many mission-critical applications such as military areas, security has been considered as one of the essential parameters in Quality of Service (QoS), and Intrusion Detection System (IDS) is considered as a fundamental requirement for security in these networks. This paper presents a lightweight Intrusion Detection System to prote...

متن کامل

Towards Wireless Security without Computational Assumptions —An Oblivious Transfer Protocol Based on an Unauthenticated Wireless Channel

Wireless security has been an active research area since the last decade. A lot of studies of wireless security use cryptographic tools, but traditional cryptographic tools are normally based on computational assumptions, which may turn out to be invalid in the future. Consequently, it is very desirable to build cryptographic tools that do not rely on computational assumptions. In this paper, w...

متن کامل

From E-learning to Ubiquitous Learning; Theoretical Principles

Background: Because of approaches to learning in every place and at any time, ubiquitous learning with knowledge of the context and framework, and due to the development of wireless technologies and sensors, the learning process has changed. Mobile learning and ubiquitous learning as models of e-learning that refer to the acquisition of knowledge, attitudes and skills through wireless technolog...

متن کامل

An efficient solution for management of pre-distribution in wireless sensor networks

A sensor node is composed of different parts including processing units, sensor, transmitter, receiver, and security unit. There are many nodes in a sensor unit. These networks can be used for military, industrial, medicine, environmental, house, and many other applications. These nodes may be established in the lands of enemies to monitor the relations. Hence, it is important to consider conse...

متن کامل

Identifying and Ranking Technology-Telecommunications Context of Information Security anagement System in E-Government Using Fuzzy AHP Approach

In recent years, many security threats have entered into the organizations’ information and changed the  organizational performance resulting in their exorbitant costs. This question is of particular importanceabout government agencies that use information and Internet systems. This issue enabled the top managers of organizations to implement a security system and minimize these costs. Using In...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2004